to manage the TLS versions used. I have an RB 3011 as a gateway to our office LAN and a third party has been engaged to do penetration scans (Kali Linux based) on the site.
I am attempting to address this point:
2.1.1 Medium 443/tcp
Medium (CVSS: 5.9)
NVT: SSL/TLS: Report Weak Cipher Suites
Product detection result
cpe:/a:ietf:transport_layer_security
Detected by SSL/TLS: Report Supported Cipher Suites (OID: 1.3.6.1.4.1.25623.1.0.
→֒802067)
Summary
This routine reports all weak SSL/TLS cipher suites accepted by a service.
Quality of Detection (QoD): 98%
Vulnerability Detection Result
‘Weak’ cipher suites accepted by this service via the TLSv1.0 protocol:
TLS_RSA_WITH_RC4_128_SHA
‘Weak’ cipher suites accepted by this service via the TLSv1.1 protocol:
TLS_RSA_WITH_RC4_128_SHA
‘Weak’ cipher suites accepted by this service via the TLSv1.2 protocol:
TLS_RSA_WITH_RC4_128_SHA
Impact
This could allow remote attackers to obtain sensitive information or have other, unspeci ed
impacts.
Solution: Solution type: > Mitigation
The configuration of this services should be changed so that it does not accept the listed weak
cipher suites anymore.
Please see the references for more resources supporting you with this task.
Should issuing the command:
> ip service set api-ssl tls-version=only-1.2
not limit things to only use TLS1.2? After issuing the command and rescanning the report does not change. I even rebooted the router.
Am I missing something fundamental here? What is the correct approach to preventing the use of those older ‘Weak’ cipher suites in TLS1.0 and 1.1?
I guess ideally I should use only TLS1.3 to pass this test. Can the be done another way, other than the tls-version command?
side-question ; you have Webfig interface available from/for the whole office LAN than ? I assume the pen-test is “internal” so on the LAN itself.
You don’t have it narrowed down to eg. 1 or 2 management-stations that can connect to your 3011 ?
Use Winbox ?
Also note, in the upcoming 7.19 release, there is newer feature that will show all open ports (similar to netstat) in /ip/services. This would help to identify WHICH process might be using something like 443 in future.